🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-401 Domain 3
Domain 3 — Module 4 of 9 44%
20 of 25 overall

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring
Domain 3: Manage Risks, Alerts, and Activities Premium ⏱ ~12 min read

Adaptive Protection: Risk Levels Meet DLP

Adaptive Protection bridges Insider Risk Management and DLP. Users with higher risk levels face stricter DLP enforcement automatically — proportional security that adapts to behaviour, not blanket rules.

The bridge between risk and enforcement

☕ Simple explanation

Imagine a smart speed camera that adjusts penalties based on the driver’s record.

A first-time speeder gets a warning letter. A driver with 3 prior offences gets an immediate fine. A driver with a suspended licence gets pulled over on the spot. Same road, same speed limit — but the response scales with the driver’s risk history.

Adaptive Protection does this for data security. It connects Insider Risk Management (which tracks user behaviour) to DLP (which enforces data policies). Users with “elevated” risk get hard blocks. Users with “minor” risk get gentle warnings. The policy stays the same — the enforcement adapts to the person.

Adaptive Protection is an integration between Insider Risk Management and DLP that dynamically assigns risk levels (elevated, moderate, minor) to users based on their cumulative behaviour patterns. DLP policies can use these risk levels as conditions, applying different actions to different risk tiers. This creates proportional enforcement — trusted users experience minimal friction, while high-risk users face strict controls, all without manual intervention.

How Adaptive Protection works end-to-end

StepComponentWhat Happens
1Insider Risk ManagementMonitors user behaviour — file downloads, email patterns, USB usage, resignation signals
2Risk scoringIRM calculates a risk score based on cumulative indicators and sequences
3Risk level assignmentUsers are assigned: Elevated, Moderate, or Minor risk
4DLP conditionDLP policies use “User’s risk level for Adaptive Protection” as a condition
5Dynamic enforcementDLP applies the action configured for that user’s current risk level
6Automatic adjustmentAs behaviour changes, risk levels update and DLP enforcement adjusts automatically

Risk levels explained

LevelBehaviour PatternTypical DurationExample
ElevatedSignificant risk indicators — bulk data movement, multiple policy triggers, departure + exfiltrationDays to weeks (depends on behaviour change)Employee downloaded 500 files after submitting resignation
ModerateSome risk indicators above baseline — unusual sharing volume, minor policy matchesDays to weeksUser shared 3x more files externally than normal this week
MinorWithin normal behaviour patterns or very slight anomaliesDefault for most usersUser’s activity is within baseline parameters

How risk levels are calculated

Risk levels are not binary. IRM uses a scoring model that considers:

  • Activity volume — how much data is being moved
  • Activity type — downloading vs sharing vs printing
  • Cumulative patterns — single event vs sustained behaviour
  • Triggering events — resignation, PIP, security incident
  • Sequence detection — download → rename → upload pattern
Adaptive Protection shifts from uniform enforcement to risk-proportional security
FeatureWithout Adaptive ProtectionWith Adaptive Protection
DLP enforcementSame for ALL users — one-size-fits-allVaries by user risk level — proportional
User experienceLow-risk users face same blocks as high-riskLow-risk users get warnings; high-risk get blocks
False positive impactHigh — legitimate users frequently blockedLow — only elevated-risk users face strict controls
Admin effortManual exceptions for trusted usersAutomatic — risk-level changes trigger enforcement changes
Security postureUniform but may be too loose or too strictRight-sized — tight for risky users, light for trusted users

Configuring Adaptive Protection

Step 1: Enable in Insider Risk Management

In Purview portal → Insider Risk Management → Adaptive Protection:

  • Turn on Adaptive Protection
  • Select which IRM policies feed risk levels (typically all active policies)
  • Configure risk level thresholds — what score = elevated, moderate, minor

Step 2: Configure risk level conditions in DLP

Edit or create DLP policies and add the condition: “User’s risk level for Adaptive Protection is…” → select Elevated, Moderate, or Minor

Step 3: Set different actions per risk level

DLP Policy: “Protect Financial Data”Minor RiskModerate RiskElevated Risk
1-4 credit card matchesAudit onlyWarnBlock with override
5+ credit card matchesWarnBlock with overrideBlock (no override)
Confidential label + external shareWarnBlock with overrideBlock + alert security

Timeframes and reassessment

SettingDefaultConfigurable?
Risk level retentionRisk levels persist while behaviour continuesYes — configure how quickly levels decay
Reassessment frequencyContinuous — updated as new activity occursBuilt-in — no manual configuration needed
Time to initial assessment7+ days of activity data before first risk assignmentFixed — cannot be accelerated
💡 Exam tip: Adaptive Protection prerequisites

For Adaptive Protection to work:

  1. At least one active Insider Risk policy must be running
  2. Users need 7+ days of activity data for initial risk assessment
  3. DLP policies must include the risk level condition — it’s not automatic
  4. Licensing: E5, E5 Compliance, or E5 Insider Risk Management

A common exam trap: “Adaptive Protection is enabled but DLP is not applying different actions.” The answer is usually that the DLP policy hasn’t been updated to include the risk level condition.

💡 Scenario: Marcus deploys Adaptive Protection at NovaTech

NovaTech’s DLP policy currently blocks all external sharing of source code. But this frustrates the 95% of developers who share legitimately (code reviews, open-source contributions, client demos).

Marcus deploys Adaptive Protection:

  • Minor risk developers (95%): Warn with policy tip when sharing code externally
  • Moderate risk (4%): Block with override — provide justification to proceed
  • Elevated risk (1%): Hard block — no override, alert security team

Result: Developer satisfaction improves dramatically. Security actually improves because the 1% of truly risky users face stricter controls than before.

Question

What are the three prerequisites for Adaptive Protection to assign risk levels?

Click or press Enter to reveal answer

Answer

1. At least one active Insider Risk Management policy. 2. Users need 7+ days of activity data. 3. DLP policies must include the 'User's risk level for Adaptive Protection' condition. Without all three, risk-based DLP enforcement cannot function.

Click to flip back

Question

How does Adaptive Protection reduce DLP false positives?

Click or press Enter to reveal answer

Answer

By applying strict DLP enforcement only to high-risk users. The 95%+ of users with minor risk get warnings instead of blocks, dramatically reducing false positive disruptions. Meanwhile, the small percentage of users showing risky behaviour face proportionally stricter controls.

Click to flip back

Question

A DLP policy uses Adaptive Protection. A user moves from 'elevated' to 'minor' risk. What happens to their DLP enforcement?

Click or press Enter to reveal answer

Answer

It automatically adjusts. The user will now experience the lighter DLP actions configured for the 'minor' risk level (e.g., warn instead of block). No admin intervention is needed — the change is dynamic and continuous.

Click to flip back

Knowledge Check

Atlas Global enabled Adaptive Protection two days ago. Zara configured a DLP policy with different actions per risk level. But all users are experiencing the same 'warn' action, regardless of their behaviour. What is the most likely cause?

🎬 Video coming soon


Next up: Purview Audit: Investigate & Retain — track every action in your Microsoft 365 tenant with Audit Standard and Audit Premium.

← Previous

Insider Risk: Investigate & Close Cases

Next →

Purview Audit: Investigate & Retain

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.